https://bugs.kde.org/show_bug.cgi?id=369175

--- Comment #18 from Mark Wielaard <m...@redhat.com> ---
Never mind the objdump -h gives the right information. The 0x3824B2B0 is indeed
in the middle of the ODP. The ODP is loaded and DATA (not CODE), which I assume
means it is readable (so we can load/read the actual function address and jump
to that) but not execute it.

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to